Rogue users

As cyber attacks continue to increase across the world, it has become more critical for countries to implement cyber operations from a defensive and offensive perspective to protect national secrets and their citizens. An Arizona State University research paper showed…Read more

What’s more terrifying, knowing that you just lost your identity or unknowingly being manipulated? While they both seem awful, they are the reality of the digital world that we live in, just look at the news. With countless articles discussing…Read more

Our lives continue to become connected, just look at your phone in your pocket. If you have an iPhone 6, for example, you are walking around with a connected device that has nine sensors in it. Nine sensors that are…Read more

The world loves to learn about the cutting edge of technology. Besides reading Techcrunch, following Kara Swisher, or stopping by your local tech gossip colleague everyday; a great way to learn about the cutting edge of tech is to take…Read more

Staying ahead of compliance regulations is not a trivial task, especially since regulations are constantly changing. The compliance regulation ‘du jour’ if you will, is the European Union (EU) General Data Protection Regulation, other wise known as GDPR. GDPR is…Read more

Cyber attacks cost businesses as much as $400 billion a year, according to insurance company Lloyd’s. Experts say that the risk of cyberattacks, especially targeted at financial institutions, has become systemic: simultaneous attacks, directed at multiple companies. That’s why…Read more

Hackers collaborate every day, from asking questions via online message boards to trading open source attack techniques. It’s time the good guys collaborate just as effectively, especially in the healthcare space in order to avoid large-scale attacks. Just look at…Read more

Countless software applications are hacked daily. Whether it’s a social engineering attack where the hacker covertly tricks an individual, a broad blast phishing attack, or a brute force attack where the hacker goes straight after vulnerabilities in an application. These…Read more

The most sensitive information in the nation is stored within the systems of the U.S. government — from social security numbers, to top secret clearances, to private inter-agency communications. From the Office of Personnel Management (OPM) breach in 2015 to…Read more